{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T06:18:28Z","timestamp":1764656308867,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031622762"},{"type":"electronic","value":"9783031622779"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62277-9_26","type":"book-chapter","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T04:01:58Z","timestamp":1718164918000},"page":"402-417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity Governance in the Medical Ecosystem: An Orientation Guide with Specific Reference to the Merging of IT and OT Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3586-6632","authenticated-orcid":false,"given":"Sebastiaan","family":"Von Solms","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4353-1253","authenticated-orcid":false,"given":"Jaco","family":"du Toit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"26_CR1","unstructured":"Morar B., Barkawie Y., Balakrishnan R., Khasawneh M., Bangara J., Abu Baker H.: IoT governance, pp. 1\u201315 (2021). https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/xe\/Documents\/technology\/me_IoT-Governance.pdf"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Kuusk, A.G., Gao, J.: Consolidating people, process and technology to bridge the great wall of operational and information technologies, 1715\u20131726 (2015)","DOI":"10.1007\/978-3-319-09507-3_147"},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P.: IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Info. Sec. 8 (2020). https:\/\/doi.org\/10.1186\/s13635-020-00111-0","DOI":"10.1186\/s13635-020-00111-0"},{"key":"26_CR4","unstructured":"KPMG: Industrial internet of things (IIoT) cyber security. https:\/\/home.kpmg\/xx\/en\/home\/services\/advisory\/risk-consulting\/cyber-security-services\/industrial-internet-of-things-cyber-security.html (2023). Accessed 26 January 2023"},{"key":"26_CR5","unstructured":"Santagate, J., Glaisner, R., Westervelt, R.: Operational cybersecurity for digitized manufacturing: Emerging approaches for the con-verged physical-virtual environment. (2019)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Von Solms, B., Von Solms, R.: Cybersecurity and information security\u2013what goes where? Info. Comp. Sec. 26, 2\u20139 (2018)","DOI":"10.1108\/ICS-04-2017-0025"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1080\/19361610.2021.1918995","volume":"16","author":"S Yusif","year":"2021","unstructured":"Yusif, S., Hafeez-Baig, A.: A conceptual model for cybersecurity governance. 16, 490\u2013513 (2021). https:\/\/doi.org\/10.1080\/19361610.2021.1918995","journal-title":"A conceptual model for cybersecurity governance."},{"key":"26_CR8","unstructured":"World Economic Forum: Cyber risk and corporate governance. https:\/\/www.weforum.org\/projects\/cyber-risk-leadership-and-corporate-governance (2023). Accessed 26 January 2023"},{"key":"26_CR9","unstructured":"Ismail, N.: IoT governance: How to deal with the compliance and security challenges. https:\/\/www.information-age.com\/iot-governance-compliance-security-challenges-16439\/ (2022). Accessed 26 January 2023"},{"key":"26_CR10","unstructured":"Millington, J.: Securing IT, OT, IoT, and IoMT in healthcare. https:\/\/www.frontier-enterprise.com\/securing-it-ot-iot-and-iomt-in-healthcare\/ (2022). Accessed 26 January 2023"},{"key":"26_CR11","doi-asserted-by":"publisher","DOI":"10.2196\/21747","volume":"23","author":"Y He","year":"2021","unstructured":"He, Y., Aliyu, A., Evans, M., Luo, C.: Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping re-view. J. Med. Internet Res. 23, e21747 (2021). https:\/\/doi.org\/10.2196\/21747","journal-title":"J. Med. Internet Res."},{"key":"26_CR12","unstructured":"Lenovo: IoT in healthcare (2019)"},{"key":"26_CR13","doi-asserted-by":"publisher","DOI":"10.2196\/12644","volume":"21","author":"MS Jalali","year":"2019","unstructured":"Jalali, M.S., Razak, S., Gordon, W., Perakslis, E., Madnick, S.: Health care and cybersecurity: Bibliometric analysis of the literature. J Med Internet Res 21, e12644 (2019). https:\/\/doi.org\/10.2196\/12644","journal-title":"J Med Internet Res"},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Bhagat, C.K.: Study of current cybersecurity threats to information & operational technology (IOT) and their effect on e-governance in Nepal. J. UTEC Eng. Manage. 1, 41\u201350 (2023). https:\/\/doi.org\/10.36344\/utecem.2023.v01i01.005","DOI":"10.36344\/utecem.2023.v01i01.005"},{"key":"26_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2021.100549","volume":"10","author":"NM Thomasian","year":"2021","unstructured":"Thomasian, N.M., Adashi, E.Y.: Cybersecurity in the internet of medical things. Health Policy and Technology 10, 100549 (2021). https:\/\/doi.org\/10.1016\/j.hlpt.2021.100549","journal-title":"Health Policy and Technology"},{"key":"26_CR16","first-page":"1","volume":"2018","author":"IM Skierka","year":"2018","unstructured":"Skierka, I.M.: The governance of safety and security risks in connected healthcare. Living in the Internet of Things: Cybersecurity of the IoT 2018, 1\u201312 (2018)","journal-title":"Living in the Internet of Things: Cybersecurity of the IoT"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Al-Salqan, Y.Y.: Security and confidentiality in healthcare informatics. In: Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE \u201898) (Cat. No.98TB100253), pp. 371\u2013375 (1998)","DOI":"10.1109\/ENABL.1998.725720"},{"key":"26_CR18","unstructured":"Wallix: OT in hospitals: The achilles heel of the healthcare industry. https:\/\/www.wallix.com\/blog\/ot-in-hospitals-the-achilles-heel-of-the-healthcare-industry (2023). Accessed 26 January 2023"},{"key":"26_CR19","unstructured":"Lanner Electronics Canada Ltd: Need of proactive IT\/OT security strategy in healthcare. https:\/\/www.lanner-america.com\/blog\/healthcare-network-ot-security\/ (2022). Accessed 26 January 2023"},{"key":"26_CR20","unstructured":"Pratap, G.: OT security: Risks, challenges and securing your environment. https:\/\/www.tripwire.com\/state-of-security\/ot-security-risks-challenges-and-securing-your-environment (2021). Accessed 26 January 2023"},{"key":"26_CR21","unstructured":"Lekidis, A.: Trends and security challenges from the IT\/OT con-vergence. https:\/\/cyberstartupobservatory.com\/trends-and-security-challenges-from-the-it-ot-convergence\/ (ND). Accessed 26 January 2023"},{"key":"26_CR22","unstructured":"RSM: Operational technology (OT) security in healthcare (2021)"},{"key":"26_CR23","unstructured":"Burns, E., Laskowski, N., Tucci, L.: What is artificial intelligence (AI)?. https:\/\/www.techtarget.com\/searchenterpriseai\/definition\/AI-Artificial-Intelligence (2023). Accessed March 2023"},{"key":"26_CR24","unstructured":"Saltmarsh, A.: The \u201cAIoT\u201d and its role in the future of healthcare. https:\/\/emag.medicalexpo.com\/the-aiot-and-its-role-in-the-future-of-healthcare\/ (2023). Accessed March 9 2023"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Kumar Dhaka, R., Panda, S.: AIOT in Healthcare systems: a Thought on Approaches and Criticism (2022)","DOI":"10.21276\/ambi.2022.09.2.rv02"},{"key":"26_CR26","unstructured":"GlobalData Healthcare: Regulating medical devices with AI capabilities. https:\/\/www.medicaldevice-network.com\/comment\/medical-devices-ai\/ (2022). Accessed 9 March 2023"},{"key":"26_CR27","unstructured":"Violino, B.: Artificial intelligence is playing a bigger role in cybersecurity, but the bad guys may benefit the most. https:\/\/www.cnbc.com\/2022\/09\/13\/ai-has-bigger-role-in-cybersecurity-but-hackers-may-benefit-the-most.html (2022). Accessed March 9 2023"},{"key":"26_CR28","unstructured":"Katuruza, P.: IT-OT convergence: Managing the cybersecurity risks. https:\/\/gca.isa.org\/blog\/it-ot-convergence-managing-the-cybersecurity-risks (ND). Accessed 27 January 2023"},{"key":"26_CR29","unstructured":"ZScaler Inc.: What is OT security?. https:\/\/www.zscaler.com\/resources\/security-terms-glossary\/what-is-operational-technology-ot-security (ND). Accessed 27 January 2023"},{"key":"26_CR30","unstructured":"Bigelow, S.J., Lutkevich, B.: What is IT\/OT convergence? everything you need to know. https:\/\/www.techtarget.com\/searchitoperations\/definition\/IT-OT-convergence (2021). Accessed 27 January 2023"},{"key":"26_CR31","unstructured":"Ismail, N.: Security is a great concern with IoT deployment, but what about edge security?. https:\/\/www.information-age.com\/security-iot-deployment-edge-security-14707\/ (2019). Accessed 27 January 2023"},{"key":"26_CR32","unstructured":"ITU: Cybersecurity challenges in the AI age. https:\/\/aiforgood.itu.int\/cybersecurity-challenges-in-the-ai-age\/ (2022). Accessed 9 March 2023"},{"key":"26_CR33","unstructured":"Dror, N.: Top 5 security threats facing artificial intelligence and machine learning. https:\/\/hubsecurity.com\/blog\/cyber-security\/security-threats-for-ai-and-machine-learning\/ (2021). Accessed 9 March 2023"},{"key":"26_CR34","unstructured":"Hubel Labs: The top 5 AI resources for boards. https:\/\/hubel-labs.com\/blog\/the-top-5-ai-resources-for-boards (2022). Accessed 9 March 2023"},{"key":"26_CR35","unstructured":"Ackerman, R.J.: CISOs and their boards of directors: Viewing cyber risk differently. https:\/\/www.tripwire.com\/state-of-security\/cisos-and-their-board-directors-viewing-cyber-risk-differently (2023). Accessed 27 January 2023"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62277-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T17:00:39Z","timestamp":1732208439000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62277-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031622762","9783031622779"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62277-9_26","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}